Fast software encryption : 10th International Workshop, FSE 2003, Lund, Sweden, February 24-26, 2003 : revised papers
著者
書誌事項
Fast software encryption : 10th International Workshop, FSE 2003, Lund, Sweden, February 24-26, 2003 : revised papers
(Lecture notes in computer science, 2887)
Springer, c2003
- タイトル別名
-
Fast software encryption : 10th International Workshop, FSE 2003, Lund, Sweden, February 2003 : revised papers
大学図書館所蔵 全26件
  青森
  岩手
  宮城
  秋田
  山形
  福島
  茨城
  栃木
  群馬
  埼玉
  千葉
  東京
  神奈川
  新潟
  富山
  石川
  福井
  山梨
  長野
  岐阜
  静岡
  愛知
  三重
  滋賀
  京都
  大阪
  兵庫
  奈良
  和歌山
  鳥取
  島根
  岡山
  広島
  山口
  徳島
  香川
  愛媛
  高知
  福岡
  佐賀
  長崎
  熊本
  大分
  宮崎
  鹿児島
  沖縄
  韓国
  中国
  タイ
  イギリス
  ドイツ
  スイス
  フランス
  ベルギー
  オランダ
  スウェーデン
  ノルウェー
  アメリカ
注記
Includes bibliographical references and index
内容説明・目次
内容説明
Fast Software Encryption is now a 10-year-old workshop on symmetric crypt- raphy, including the design and cryptanalysis of block and stream ciphers, as well as hash functions. The ?rst FSE workshop was held in Cambridge in 1993, followed by Leuven in 1994, Cambridge in 1996, Haifa in 1997, Paris in 1998, Rome in 1999, New York in 2000, Yokohama in 2001, and Leuven in 2002. This Fast Software Encryption workshop, FSE 2003, was held February 24- 26, 2003 in Lund, Sweden. The workshop was sponsored by IACR (International Association for Cryptologic Research) and organized by the General Chair, Ben Smeets, in cooperation with the Department of Information Technology, Lund University. Thisyearatotalof71papersweresubmittedtoFSE2003.Afteratwo-month reviewing process, 27 papers were accepted for presentation at the workshop. In addition, we were fortunate to have in the program an invited talk by James L. Massey. The selection of papers was di?cult and challenging work. Each submission was refereed by at least three reviewers. I would like to thank the program c- mittee members, who all did an excellent job.
In addition, I gratefully ackno- edge the help of a number of colleagues who provided reviews for the program committee. They are: Kazumaro Aoki, Alex Biryukov, Christophe De Canni' ere, Nicolas Courtois, Jean-Charles Faug' ere, Rob Johnson, Pascal Junod, Joseph Lano, Marine Minier, Elisabeth Oswald, H? avard Raddum, and Markku-Juhani O. Saarinen.
目次
Block Cipher Cryptanalysis.- Cryptanalysis of IDEA-X/2.- Differential-Linear Cryptanalysis of Serpent.- Rectangle Attacks on 49-Round SHACAL-1.- Cryptanalysis of Block Ciphers Based on SHA-1 and MD5.- Analysis of Involutional Ciphers: Khazad and Anubis.- Boolean Functions and S-Boxes.- On Plateaued Functions and Their Constructions.- Linear Redundancy in S-Boxes.- Stream Cipher Cryptanalysis.- Loosening the KNOT.- On the Resynchronization Attack.- Cryptanalysis of Sober-t32.- MACs.- OMAC: One-Key CBC MAC.- A Concrete Security Analysis for 3GPP-MAC.- New Attacks against Standardized MACs.- Analysis of RMAC.- Side Channel Attacks.- A Generic Protection against High-Order Differential Power Analysis.- A New Class of Collision Attacks and Its Application to DES.- Block Cipher Theory.- Further Observations on the Structure of the AES Algorithm.- Optimal Key Ranking Procedures in a Statistical Cryptanalysis.- Improving the Upper Bound on the Maximum Differential and the Maximum Linear Hull Probability for SPN Structures and AES.- Linear Approximations of Addition Modulo 2 n .- Block Ciphers and Systems of Quadratic Equations.- New Designs.- Turing: A Fast Stream Cipher.- Rabbit: A New High-Performance Stream Cipher.- Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive.- PARSHA-256 - A New Parallelizable Hash Function and a Multithreaded Implementation.- Modes of Operation.- Practical Symmetric On-Line Encryption.- The Security of "One-Block-to-Many" Modes of Operation.
「Nielsen BookData」 より